CVE-2026-23326

Source
https://cve.org/CVERecord?id=CVE-2026-23326
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23326.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-23326
Downstream
Related
Published
2026-03-25T10:27:19.021Z
Modified
2026-04-22T08:29:25.045364262Z
Summary
xsk: Fix fragment node deletion to prevent buffer leak
Details

In the Linux kernel, the following vulnerability has been resolved:

xsk: Fix fragment node deletion to prevent buffer leak

After commit b692bf9a7543 ("xsk: Get rid of xdpbuffxsk::xskblistnode"), the list_node field is reused for both the xskb pool list and the buffer free list, this causes a buffer leak as described below.

xpfree() checks if a buffer is already on the free list using listempty(&xskb->listnode). When listdel() is used to remove a node from the xskb pool list, it doesn't reinitialize the node pointers. This means listempty() will return false even after the node has been removed, causing xpfree() to incorrectly skip adding the buffer to the free list.

Fix this by using listdelinit() instead of listdel() in all fragment handling paths, this ensures the list node is reinitialized after removal, allowing the listempty() to work correctly.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23326.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
560c974b7ccd95bb9ff20df77f6654283e45c9c6
Fixed
5172adf9efb8298a52f4dcdc3f98d4d9d1e06a6d
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
fd5614763805d6f386bd07cc53558f88b1b1eb62
Fixed
2a9ea988465ece5b6896b1bdc144170a64e84c35
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b692bf9a7543af7ad11a59d182a3757578f0ba53
Fixed
645c6d8376ad4913cbffe0e0c2cca0c4febbe596
Fixed
b38cbd4af5034635cff109e08788c63f956f3a69
Fixed
60abb0ac11dccd6b98fd9182bc5f85b621688861

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23326.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.17
Type
ECOSYSTEM
Events
Introduced
6.19.0
Fixed
6.19.7

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23326.json"